Distributed Localization Algorithm Using Hybrid Cuckoo Search with Hill Climbing (CS-HC) Algorithm for Internet of Things

Authors

  • S.P. Kesavan Associate Professor, Department of ECE, Nandha College of Technology, Erode, Tamil Nadu, India Author
  • K. Sivaraj Assistant Professor, Department of ECE, Nandha College of Technology, Erode, Tamil Nadu, India. Author
  • A. Palanisamy Assistant Professor, Department of ECE, Nandha College of Technology, Erode, Tamil Nadu, India. Author
  • R. Murugasamy Associate Professor, Department of ECE, Nandha Engineering College, Erode, Tamilnadu, India. Author

DOI:

https://doi.org/10.61841/sy9qe459

Keywords:

Distributed Localization, Computational Complexity, Hybrid Cuckoo Search, Hill Climbing, Internet of Things.

Abstract

 Currently, Internet of Things (IoT) influenced applications are significant upon deployed sensors accurately. Anyhow, classical optimization problem is induced along NP-hard class of problems to determine the accurate localization of deployed sensors nodes. Thence this proposal work provides distributed localization algorithm using hybrid Cuckoo search with hill climbing (CS-HC) algorithm. In turn it improvises the mechanism of optimisation solution by validating threshold value for IoT. Computational complexity get reduced by locating deployed sensor nodes via CS-HC algorithm as well as increase lifetime of resource constrained IoT sensor nodes. Simulated results predicts that proposed CS-HC algorithm produces significant performance accurately 

Downloads

Download data is not yet available.

References

[1] C.-W. Tsai, C.-F. Lai, and A. V. Vasilakos, “Future internet of things: open issues and challenges,” Wireless

Networks, vol. 20, no. 8, pp. 2201– 2217, 2014.

[2] S. Hasan and E. Curry, “Thingsonomy: Tackling variety in internet of things events,” IEEE Internet Computing, vol.

19, no. 2, pp. 10–18, 2015.

[3] X. Li, R. Lu, X. Liang, X. Shen, J. Chen, and X. Lin, “Smart community: an internet of things application.” IEEE

Communications Magazine, vol. 49, no. 11, pp. 68–75, 2011.

[4] Z. Chen, F. Xia, T. Huang, F. Bu, and H. Wang, “A localization method for the internet of things,” The Journal of

Supercomputing, vol. 63, no. 3, pp. 657–674, 2013.

[5] S. Cirani, L. Davoli, G. Ferrari, R. Leone, P. Medagliani, M. Picone, ´ and L. Veltri, “A scalable and self-configuring

architecture for service discovery in the internet of things,” IEEE Internet of Things Journal, vol. 1, no. 5, pp. 508–

521, 2014.

[6] S. Raza, L. Wallgren, and T. Voigt, “Svelte: Real-time intrusion detection in the internet of things,” Ad hoc networks,

vol. 11, no. 8, pp. 2661– 2674, 2013.

[7] L. Zhou and H.-C. Chao, “Multimedia traffic security architecture for the internet of things,” IEEE Network, vol. 25,

no. 3, pp. 35–40, 2011.

[8] S. Sivakumar and R. Venkatesan, “Meta-heuristic approaches for minimizing error in localization of wireless sensor

networks,” Applied Soft Computing, vol. 36, pp. 506–518, 2015.

[9] J. Hightower and G. Borriello, “A survey and taxonomy of location systems for ubiquitous computing,” IEEE

computer, vol. 34, no. 8, pp. 57–66, 2001.

[10] N. Bulusu, J. Heidemann, and D. Estrin, “Gps-less low-cost outdoor localization for very small devices,” IEEE

personal communications, vol. 7, no. 5, pp. 28–34, 2000.

[11] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: Vision, applications and research

challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2012.

[12] S. Pandey and S. Varma, “A range based localization system in multihop wireless sensor networks: A distributed

cooperative approach,” Wireless Personal Communications, vol. 86, no. 2, pp. 615–634, 2016.

[13] M. Aziz, M.-H. Tayarani-N, and M. R. Meybodi, “A two-objective memetic approach for the node localization

problem in wireless sensor networks,” Genetic Programming and Evolvable Machines, vol. 17, no. 4, pp. 321–358,

2016.

[14] M. X. Cheng and W. B. Wu, “A model-free localization method for sensor networks with sparse anchors,” in

Communications (ICC), 2016 IEEE International Conference on. IEEE, 2016, pp. 1–7.

[15] A. Pal, “Localization algorithms in wireless sensor networks: Current approaches and future challenges,” Network

protocols and algorithms, vol. 2, no. 1, pp. 45–73, 2010.

[16] G. Mao, B. Fidan, and B. D. Anderson, “Wireless sensor network localization techniques,” Computer networks, vol.

51, no. 10, pp. 2529– 2553, 2007.

[17] A. Gopakumar and L. Jacob, “Localization in wireless sensor networks using particle swarm optimization,” in

Wireless, Mobile and Multimedia Networks, 2008. IET International Conference on. IET, 2008, pp. 227– 230.

[18] R. V. Kulkarni and G. K. Venayagamoorthy, “Particle swarm optimization in wireless-sensor networks: A brief

survey,” IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 41, no. 2, pp.

262–267, 2011.

[19] Nandagopal S., Arunachalam V.P., Karthik S."A novel approach for inter-transaction association rule mining, Journal

of Applied Sciences Research VOL, 8, Issue 7, 2012.

[20] Kannan R., Selvambikai M., Jeena Rajathy I., Ananthi S. Rasayan, A study on structural analysis of electroplated

Nano crystalline nickel based thin films, Journal of Chemistry, Vol 10, issue 4, 2017.

[21] Arunvivek G.K., Maheswaran G., Senthil Kumar S., Senthilkumar M., Bragadeeswaran T. Experimental study on

influence of recycled fresh concrete waste coarse aggregate on properties of concrete. International Journal of

Applied Engineering Research, Vol 10, issue 11, 2015

[22] Krishna S.K., Sathya M. Usage of nanoparticle as adsorbent in adsorption process. A review International Journal of

Applied Chemistry, vol 11, Issue 2, 2015.

[23] Sudha S., Manimegalai B., Thirumoorthy P. A study on routing approach for in-network aggregation in wireless

sensor networks, International Conference on Computer Communication and Informatics: Ushering in Technologies

of Tomorrow, Today, ICCCI 2014.

[24] Satheesh A., Jeyageetha V. Improving power system stability with facts controller using certain intelligent

techniques, International Journal of Applied Engineering Research, Vol 9, no 23, 2014.

[25] Ashok V., Kumar N, Determination of blood glucose concentration by using wavelet transform and neural networks,

Iranian Journal of Medical Sciences, Vol 38, Issue 1, 2013.

[26] Somasundaram K., Saritha S., Ramesh K, Enhancement of network lifetime by improving the leach protocol for large

scale WSN, Indian Journal of Science and Technology, Vol 9, Issue 16, 2016.

[27] Jayavel S., Arumugam S., Singh B., Pandey P., Giri A., Sharma A. Use of Artificial Intelligence in automation of

sequential steps of software development / production, Journal of Theoretical and Applied Information Technology,

Vol 57, Issue 3, 2013.

[28] Ramesh Kumar K.A., Balamurugan K., Gnanaraj D., Ilangovan S, Investigations on the effect of flyash on the SiC

reinforced aluminium metal matrix composites, Advanced Composites Letters, Vol 23, Issue 3, 2014.

[29] Suresh V.M., Karthikeswaran D., Sudha V.M., Murali Chandraseker D, Web server load balancing using SSL backend forwarding method. IEEE-International Conference on Advances in Engineering, Science and Management,

ICAESM-2012, 2012.

[30] Karthikeswaran D., Sudha V.M., Suresh V.M., Javed Sultan A, A pattern based framework for privacy preservation

through association rule mining, IEEE-International Conference on Advances in Engineering, Science and

Management, ICAESM-2012, 2012.

[31] Senthil J., Arumugam S., Shah P, Real time automatic code generation using generative programming paradigm,

European Journal of Scientific Research, vol. 78, issue 4, 2012.

[32] Vijayakumar J., Arumugam S, Certain investigations on foot rot disease for betelvine plants using digital imaging

technique, Proceedings - 2013 International Conference on Emerging Trends in Communication, Control, Signal

Processing and Computing Applications, IEEE-C2SPCA", 2013.

[33] Vijayakumar J., Arumugam S. Odium piperis fungus identification for piper betel plants using digital image

processing, Journal of Theoretical and Applied Information Technology, vol 60, issue 2, 2014.

[34] Manchula A., Arumugam S, Face and fingerprint biometric fusion: Multimodal feature template matching algorithm,

International Journal of Applied Engineering Research, vol 9, issue 22, 2014.

[35] Ramesh Kumar K.A., Balamurugan K., Arungalai Vendan S., Bensam Raj J, Investigations on thermal properties,

stress and deformation of Al/SiC metal matrix composite based on finite element method. Carbon - Science and

Technology, Vol 6, Issue 3, 2014.

[36] Kanchana A., Arumugam S, Palm print texture recognition using connected-section morphological segmentation,

Asian Journal of Information Technology Vol 6, Issue 3, 2014.

[37] Padmapriya R., Thangavelu P, Characterization of nearly open sets using fuzzy sets, Global Journal of Pure and

Applied Mathematics, vol 11, issue 1, 2015.

[38] P.B. Narandiran, T. Bragadeeswaran, M. Kamalakannan, V. Aravind, Manufacture of Flyash Brick Using Steel Slag

and Tapioca Powder. Jour of Adv Research in Dynamical & Control Systems, Vol. 10, No. 12, 2018, 527-532

[39] R. Girimurugan*, N. Senniangiri, K. Adithya, B. Velliyangiri, Mechanical Behaviour of Coconut Shell Powder

Granule Reinforced Epoxy Resin Matrix Bio Composites, Jour of Adv Research in Dynamical & Control Systems,

Vol. 10, No. 12, 2018, 533-541.

Downloads

Published

31.10.2019

How to Cite

Kesavan, S., Sivaraj, K., Palanisamy, A., & Murugasamy, R. (2019). Distributed Localization Algorithm Using Hybrid Cuckoo Search with Hill Climbing (CS-HC) Algorithm for Internet of Things. International Journal of Psychosocial Rehabilitation, 23(4), 1171-1179. https://doi.org/10.61841/sy9qe459